Search alternatives:
coder detecting » model detecting (Expand search), code detection (Expand search), hole detecting (Expand search)
changes program » change program (Expand search), chaves program (Expand search), exchange program (Expand search)
python python » pythons python (Expand search), piton python (Expand search), pitons python (Expand search)
manim python » monty python (Expand search), api python (Expand search)
coder coder » coder decoder (Expand search), code code (Expand search), decoder codec (Expand search)
coder detecting » model detecting (Expand search), code detection (Expand search), hole detecting (Expand search)
changes program » change program (Expand search), chaves program (Expand search), exchange program (Expand search)
python python » pythons python (Expand search), piton python (Expand search), pitons python (Expand search)
manim python » monty python (Expand search), api python (Expand search)
coder coder » coder decoder (Expand search), code code (Expand search), decoder codec (Expand search)
1
2
“... testing integrated code, build and test conflicts, respectively. Detecting such semantic conflicts...”
Access document
Access document
Doctoral thesis
3
4
5
“...Refatoramento é uma transformação aplicada a um programa para melhorar suas qualidades internas...”
Access document
Access document
Master thesis
6
“...Refatoramento é uma transformação aplicada a um programa para melhorar suas qualidades internas...”
Access document
Access document
Master thesis
7
“... de desenvolvimento. Na automatização dos testes, os oráculos são essenciais, representando um mecanismo (programa...”
Access document
Access document
Master thesis
8
“... de software usam ofuscação de código para defender seus programas contra ataques de propriedade intelectual...”
Access document
Access document
Doctoral thesis
9
“... abstrata; CFG—grafo de controle de fluxo; PDG—grafo de dependência de programa; e Tokenização...”
Access document
Access document
Bachelor thesis
10
“... threats arise inherent vulnerabilities of web systems, where malicious code or content injection are the...”
Access document
Access document
Master thesis
11
“..., we instead try to detect a code level adaptation of the notion of interference from Goguen and Meseguer...”
Access document
Access document
Master thesis
12
“..., Programa de Pós-Graduação em Gestão do Cuidado em Enfermagem, Florianópolis, 2023....”
Access document
Access document
Master thesis
13
“... it is controversial whether the disease continues to progress in old age. When it progresses to the cardiac form, the...”
Access document
Access document
Doctoral thesis
14
15
“... System (GIS), in addition to detecting the main changes that occurred as a result of the Forest Code...”
Access document
Access document
Master thesis
16
“... used to calculate the geometry and some molecular properties. The DRAGON program was also used...”
Access document
Access document
Master thesis
17
18